Ubuntu 16.04 Linux Kernel Vulnerabilities. Update Ubuntu 16.04 immediately as Canonical has published a new security notice to patch Linux Kernel Vulnerabilities for Ubuntu 16.04 LTS (Xenial Xerus).
USN-3016-1: Linux kernel vulnerabilities
Ubuntu Security Notice USN-3016-1 explains that a total of seven Linux kernel vulnerabilities have been found and then fixed in the updated kernel packages for Ubuntu 16.04 LTS.
Ubuntu Security Notice USN-3016-1
- 27th June, 2016 – Linux vulnerabilities – A security issue affects these releases of Ubuntu 16.04 LTS and its derivatives. The update brings several security issues that has been fixed in the Kernel.
The security notice explains:
- Jesse Hertz and Tim Newsham discovered that the Linux netfilter implementation did not correctly perform validation when handling 32 bit compatibility IPT_SO_SET_REPLACE events on 64 bit platforms. A local unprivileged attacker could use this to cause a denial of service (system crash) or execute arbitrary code with administrative privileges.
- Kangjie Lu discovered an information leak in the core USB implementation in the Linux kernel. A local attacker could use this to obtain potentially sensitive information from kernel memory.
- It was discovered that an information leak exists in the Rock Ridge implementation in the Linux kernel. A local attacker who is able to mount a malicious iso9660 file system image could exploit this flaw to obtain potentially sensitive information from kernel memory.
Read more on http://www.ubuntu.com/usn/usn-3016-1/
Update instructions
The problem can be corrected by updating your system to the following package version:
- Ubuntu 16.04 LTS:
- linux-image-4.4.0-28-powerpc64-smp 4.4.0-28.47
- linux-image-4.4.0-28-lowlatency 4.4.0-28.47
- linux-image-4.4.0-28-powerpc-smp 4.4.0-28.47
- linux-image-4.4.0-28-generic-lpae 4.4.0-28.47
- linux-image-4.4.0-28-powerpc64-emb 4.4.0-28.47
- linux-image-4.4.0-28-generic 4.4.0-28.47
- linux-image-4.4.0-28-powerpc-e500mc 4.4.0-28.47
To update your system, please run the following commands in Terminal:
$ sudo apt-get update
$ sudo apt-get dist-upgrade
When performing an update, please review the update and then confirm. Please restart the system after the update.